|Publication number||US6907401 B1|
|Application number||US 09/524,112|
|Publication date||Jun 14, 2005|
|Filing date||Mar 13, 2000|
|Priority date||Mar 13, 2000|
|Also published as||WO2001069833A2, WO2001069833A3|
|Publication number||09524112, 524112, US 6907401 B1, US 6907401B1, US-B1-6907401, US6907401 B1, US6907401B1|
|Inventors||John Jacques Vittal, Cynthia Grace Mills, Laurence Raphael Brothers|
|Original Assignee||Verizon Corporate Services Group Inc., Genuity Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (20), Non-Patent Citations (2), Referenced by (78), Classifications (12), Legal Events (10)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application relates to the field of electronic commerce and more particularly to methods and systems which enable a merchant to control data provided to an online aggregator, such as a portal, for the purpose of selling goods and services.
Online shopping and online commerce is quickly becoming one of the top Internet activities. For example, a user can search on the Internet for a specific product and/or service and can receive a list of merchants who carry the item of interest or provide the respective service. For this purpose, the user typically uses a search engine, such as Yahoo™, or Excite™. Merchants may include individuals or organizations offering to buy, sell or exchange goods, services and information on the Internet.
With the proliferation of Web sites and Internet merchants, many of whom sell similar products, it has generally become increasingly difficult for a consumer to find a product or service. For this reason, aggregators, such as a portal or other entity aggregating product and server information, have been established as public or private providers of shopping services to consumers and organizations. Such aggregators typically have listings of goods and services, much like the yellow pages, which allow a consumer to comparison shop and find information about the goods and services at one location, such as a single Web site. These aggregators may use software, known as robots, to find and compare goods and services, and present the consumer, for example, with a best priced item.
Aggregators may focus on shopping information and activities that involve multiple merchants, such as consumer comparison shopping, virtual malls, and exchanges (e.g., classified advertising and formal requests for proposals). Aggregator sites may be open to the general public, or to membership sites serving a selected group of individuals and organizations.
Aggregators may utilize Web robots, software that enables a search through the Web's hypertext structure to retrieve documents on remote sites. Aggregators may help retrieve documents related to Web statistics (e.g., how many Web sites exist?), maintenance (e.g., are links oudated or “dead”?), updates of a database (Does my local copy of some software reflect changes made to some offsite, updated master software?), and search topics. An example of a search topic is the price of a certain commercial product. An aggregator may be used to determine the best price of a commercial product listed on the Internet, for example.
Individual merchants may contract with the aggregator to provide users with information about the merchant, to prominently advertise the merchant's products and services, and to also accept orders for the merchant's merchandise and arrange payment for orders received. A merchant having an Internet address may register with the provider of the search engine to have the merchant's universal resources locator (URL) prominently displayed in order to receive a large number of user visits, or “hits,” to the merchant's Web site. The aggregator may also provide the merchants with a summary of on-line purchases and an audit trail. In order to be listed and conduct business with the aggregator, however, a merchant may have to enter into a longer-term contractual relationship with the aggregator and disclose confidential information, such as financial or business information, to the aggregator. The aggregator, on the other hand, without an agreement in place with the merchant may incur expenses with a) finding a merchant b) accessing the merchant's web site for appropriate data, c) determining how to interpret the available data and d) establishing that such data mining operations do not violate the copyright of the merchant. In addition, the aggregator may be limited to acquiring only that data which the merchant chooses to make publicly available. If the merchant is one with whom the aggregator would like to have an agreement, additional effort and time may be involved in signing a merchant up for service and manually or periodically updating the merchant's listing and uploading audit information to the merchant, such as the number of hits of the URL of the merchant.
It would therefore be desirable for an aggregator to have an automated means of acquiring a merchant, deciding whether or not to include a merchant in a service of the aggregator, and having permission to use the data of the merchant on the site of the aggregator in accordance with the specifications of the merchant, and what the aggregator has agreed.
To facilitate the use of aggregators, a portal switch may be introduced that allows a merchant of a commercial product, or service to have more control of the information made available to the aggregator.
More specifically, a computer-implemented method to permit a merchant to selectively participate in an aggregator is provided. The method includes providing software recognized by the aggregator to the merchant, and allowing the merchant, without having prior direct contact with the aggregator, to activate the software to permit participation in the aggregator.
The merchant may give permission to the aggregator to provide information associated with the merchant to a user of the aggregator. The method may further include allowing the aggregator to specify data transfer parameters to influence an exchange of information between a computer associated with the merchant and the aggregator. The method may further include providing the merchant with an encryption key to permit the aggregator to verify authenticity of said merchant. Allowing the merchant to activate the software may include allowing the merchant to set the portal switch to specify data transfer parameters, services and data that may be exchanged between the merchant and the aggregator. The merchant may be provided with an encryption key to permit the aggregator to verify authenticity of said merchant.
The step of allowing the merchant to set the portal switch to specify data transfer parameters, services and data may include allowing the merchant to set the portal switch to specify at least one of an upload option, a transfer format, a pricing option, a placement, a shopping option, a data distribution, and a data lifetime.
The transfer format may be at least one of a profile format, an ASCII text, an Excel™ spreadsheet, an interoperable catalogue format, a database exchange format, and an electronic data interchange. The upload option may include a transfer protocol for the data that may be exchanged by the merchant and the aggregator. The transfer protocol may be at least one of a hypertext transfer protocol, a file transfer protocol, an xmodem protocol, a standard query language, a simple mail transfer protocol, and an open database connectivity. The pricing option may allow the aggregator to display a price of goods or services of the merchant to a user of the aggregator. The data lifetime may specify a period of time during which data from the merchant may be displayed to a user of the aggregator. The placement may influence where data from the merchant may be displayed to a user of the aggregator.
Also presented below is a portal switch, residing on a computer-readable medium, for selectively linking a computer associated with a merchant to an aggregator. The portal switch may cause the computer to enable the merchant to participate in the aggregator based on a setting of the portal switch selected by the merchant, and exchange information between the computer and the aggregator based on the setting of the portal switch. To participate in the aggregator, no direct prior contact between the merchant and the aggregator may be necessary.
The portal switch may also include an encryption key to permit the aggregator to verify authenticity of the merchant. The aggregator may specify data transfer parameters to influence an exchange of information between the computer and the aggregator. An encryption key may be provided to permit the aggregator to verify authenticity of the merchant. The setting may specify data transfer parameters, services and data that may be exchanged between the computer and the aggregator. The data transfer parameters, services, and data may include an upload option, a transfer format, a pricing option, a placement, a shopping option, a data distribution, and a data lifetime. The transfer format may be at least one of a profile format, an ASCII text, an Excel™ spreadsheet, an interoperable catalogue format, a database exchange format, and an electronic data interchange.
The upload option may include a transfer protocol for the information exchanged between said computer and the aggregator. The transfer protocol may be at least one of a hypertext transfer protocol, a file transfer protocol, an xmodem protocol, a standard query language, a simple mail transfer protocol, and an open database connectivity. The pricing option may allow the aggregator to display a price of goods or services of the merchant to a user of the aggregator. The data lifetime may specify a period of time during which data from the merchant may be displayed to a user of the aggregator. The placement may influence where data from the computer associated with the merchant may be displayed to a user of the aggregator.
The portal switch may enable the merchant to give permission to the aggregator to display data associated with the merchant to a user of the aggregator. To participate in the aggregator, no direct prior contact between the merchant and the aggregator may be necessary.
The foregoing and other objects and advantages of the invention will be appreciated more fully from the following further description thereof, with reference to the accompanying drawings wherein like reference numbers and designations in the various drawings indicate like elements; and wherein
Particular systems and methods will now be described wherein a merchant may enable (or disable) participation in an aggregator site by switching on or off as little as a single software setting, or switch. However, it will be understood by one of ordinary skill in the art that the systems and methods described herein are suitable for other applications, including linking of Web sites with search engines, which previously required bilateral agreements between the merchant and the aggregator. Accordingly, it will be understood by those of ordinary skill in the art that the systems and methods described herein are merely illustrative of the invention and not limiting in any way.
The content sources 450 may be listed by the aggregator 400. The merchant 380 and the aggregator 400 may have to negotiate to decide when, how often and in which manner to update the URL links and the contents of the respective sites. The merchant 380 may have no direct control over the type and prominence of the information content displayed to the user 200 by the aggregator 400. It may also happen that some data related to the goods and services of the merchant 380 are included in the aggregator's site without the merchant's explicit permission. These data may have been mined, for example, days, weeks, or months in the past using the Internet robots described above. Additionally, the aggregator 400, instead of storing these data, may retrieve information pertaining to the merchant 380 on demand in response to a user query, with or without the merchant's consent.
With reference now to
Users 20 may access merchant information via the aggregator 40, which allows a user 20 to search for a desired item. The users 20 may perform this search by either interrogating the aggregator catalog and data profile 44, which may contain a number of catalog and data profiles related to the merchants 38, or by searching directly the merchant databases 34, 35 of the servers 30, 31. Merchant databases 34, 35 may only be accessible to the user 20 via the aggregator 40 if the aggregator has entered into an arrangement with the merchant controlling the merchant B server 31, and if the aggregator 40 and merchant have established a portal-merchant link 33 through which data from the merchant B server 31 may be transmitted. For merchant servers 30, 31 and merchant databases 34, 35 accessed by the user 20, the aggregator 40 may maintain an aggregator log and database 46 containing auditing, server, and marketing information, such as the number of hits on a specific merchant Web site, and the time duration during which the Web site was viewed. To preserve confidentiality, this information may be combined so as to not reveal specific information about any one particular merchant.
Referring now to
The participants, i.e., the merchant 38 having a merchant B server and/or aggregator 40, in the operation of the portal switch may purchase the software for the portal switch 39 from an independent software vendor 60, from the aggregator 40 (in which case the software default settings may be preconfigured to the aggregator's default parameters for ease of use), or from a clearinghouse system (not shown). The clearinghouse system can be any system that actively searches, on the network 10 for example, for new portal switches, and stores information about them to better serve participating merchants and aggregators 40. The participants of the operation of the portal switch 39 may purchase information stored on an appropriate medium, such as a CD-ROM available off the shelf, or on the hard drive of a server from which the participants may download the information.
In one embodiment, the portal switch 39 may be supplied to the participating merchant having a merchant B server 31, by an independent software vendor 60. The independent software vendor 60 may also provide the software protocols of the portal switch 39 to the aggregator 40 through a prior agreement between the vendor 60 and aggregator 40. As discussed further below, the portal switch 39 may also include data tables with default values understood by the aggregator 40 for how and when catalog and profile information can be transferred. Participating merchants may change the default values of various individual settings to influence how their information is being, transferred, configured and displayed at the aggregator's site.
The portal switch 39 may be used with aggregators 40 that mine data over a time span, or with aggregators 40 that obtain information on demand in response to a query by a user 20. In either case, the portal switch 39 may control the flow of data accessible to a user 20 via the aggregator 40. For example, the portal switch 39 may dictate the type, frequency, and manner in which data is displayed to a user 20 who utilizes an aggregator 40 to obtain information about a particular product or service. The software controlling the portal switch 39 may reside in part or in whole at sites that include the merchant B database 35, the aggregator log and database 46, or both. Moreover, this software may run on a server operated by the aggregator 40, or on the merchant B server 31, or on both.
To be able to set options for the type, frequency, and presentation of the data supplied to the aggregator 40 by the merchant, the merchant may need to have access to a software key 62. This software key 62 allows the aggregator 40 to authenticate the merchant before engaging in any communication with the participating merchant. Conversely, the aggregator may have a key (not shown) which the merchant may use to authenticate the aggregator before engaging in communication. The merchant may choose and transmit the portal switch 39 settings by utilizing an Internet browser 61, as is detailed below.
Referring now to
As also indicated in
The transfer format may include ASCII text with comma-separated values, Excel™ spreadsheets, interoperable catalogue formats, database exchange formats, profile formats, and EDI (electronic data interchange). Transfer protocols may include hypertext transfer protocol (http), file transfer protocol (ftp), simple mail transfer protocol (smtp), open database connectivity (ODBC), standard query language (SQL) and responses, and various modem protocols, such as xmodem. Transfer control can either rest with the aggregator 40, wherein the aggregator 40 requests data from the merchant (pull), or with the merchant 38, wherein the merchant 38 voluntarily transfers data to the aggregator 40 (push). The transfer frequency may be selected so that data are transferred between the merchant 38 and the aggregator 40 on demand, at a defined time interval, or both.
The portal switch 39 may also perform format conversions, whereby the merchant's information can be displayed differently at the aggregator's site. For example, information about the merchant's goods and services may reside on the merchant B server 31 in the form of a spreadsheet, while the aggregator 40 displays the corresponding information as part of an aggregator's Web page. Other format conversion will be apparent to those skilled in the art.
The portal switch 39 may also enhance the security aspects of commercial transactions between the merchant 38 and the aggregator 40 by facilitating distribution of private/public keys for encrypting sensitive information, such as credit card numbers, and verifying the authenticity of a party. Most encrypted transactions use a combination of private keys, public keys, secret keys, hash functions, and digital certificates to achieve authentication (of sender and recipient), confidentiality, message integrity, and non-repudiation by either party. Each sender (the aggregator 40 or the merchant 38) and each recipient (the merchant 38 or the aggregator 40) has a private key, known only to him/her and a public key, which can be known by anyone. Each encryption/decryption process requires at least one public key and one private key, and both must be from the same party. In the present example, the merchant's public key/private key pair may be generated by or reside within the portal switch 39. The sender's and recipient's public keys may be validated (signed) by a certificate authority to produce a digital certificate. Encryption processes of this type are known in the art and enable, for example, the aggregator 40 to securely transmit confidential user information to the merchant and to verify the identity of the merchant.
As also seen in
The software of the portal switch 39 may include an application, such as a Java application, that is distributed to the merchant. This application may be implemented as a Java applet in a web browser, interacting directly with an aggregator 40, or clearinghouse system that acts as a proxy. If a proxy is used, the Java application could run at the clearinghouse system on behalf of the merchant who may have an interface to the clearinghouse system. The information conveyed by the merchant 38 to the aggregator 40 could be stored (or a copy cached) at the clearinghouse system or aggregator 40. In such case, the merchant 38 may maintain a master copy of his application, preference, and keys locally. Normally, a Java application runs in an environment outside of a particular browser to allow it to interact with multiple web sites.
In systems where multiple merchants coexist, a central default location may contain files that can be used as templates to ease the merchant experiences. These templates may be copied to the merchant's home directory for customization. The participant identification may be partially filled out in such a system. The aggregator 40 and independent software vendor 60 may also maintain libraries of templates which may be accessed when appropriate.
For rows such as 800, 801, 803, and 806, the merchant may type the relevant information in the provided fields. Where formatting of standard address portions (such as address, phone number, and e-mail in the contact row 804) may be required, the formats published in the P3P1.0 specification (Platform for Privacy Preferences) at http://www.w3.org/TR/P3P may be used. If Internet Explorer is used as a web form interface, automatic string completion may be used to facilitate data entry.
For access to the Dun & Bradstreet™ Web site, http://www.dnb.com, an agreement may be arranged to allow one-time access to a database. In one embodiment, any costs incurred as a result of arranging such an agreement may be paid by the independent software vendor 60 in an aggregate arrangement.
The participant, i.e., the merchant 38 and/or aggregator 40, may utilize an interface, such as one similar to the portal switch interface 79, to input the data represented in the access profiles table 820. The interface may provide listed options for the merchant 38 to choose, for example, to facilitate the merchant's task. In one embodiment, if the merchant 38 does not choose an option, some default options may be assumed.
When a certificate is provided, the certificate may first be matched against information provided in the partner listname row 841. In one embodiment, when a certificate is provided, the certificate is first compared to the BLACKLIST and BLACKLISTEE data referred to in row 841, then against a partner table 840 explicitly containing the corresponding partner certificate. If no explicit match is found as a result of comparing these certificates, the certificate may be examined to see if it satisfies the conditions specified in the data corresponding to the certificate mask row 842 for each partner table provided, starting with BLACKLIST and BLACKLISTEE and so on through the partner tables ending with the DEFAULT partner table referred to in row 841. When the conditions for match are found, the certificate is assigned to that group. If not explicitly present, the certificate may be added to the implicit certificate list referred to in row 844 for the matching partner table.
Implicit certificates are a refinement so that a user can track who has actually been interacting with the site. BLACKLIST describes partners with which the participants do not wish to communicate. BLACKLISTEE describes partners that have blacklisted the participant, so that contact with those partners is not initiated by the BLACKLISTEE participant.
A similar set of lists may be provided by the independent software vendor 60 to define special purpose partner lists including clearinghouses, certificate authorities, and reflector sites, as well as lists advertising selected aggregators and merchants. Such preconfigured lists may help the participant to get started.
Some of the information provided by the participant for the participant identification and certificate options table, the access profiles table 820, and/or the partner table 840 may be information that the participant is willing to share with anyone, without the intervention of the portal switch 39. For example, if a web connected host sends a search string URL to the participant web site, addressing a search engine through Common Gateway Interface (CGI) or other active mechanism, the requestor receives back a page listing product information that matches that search string. The merchant may use tools known to one of ordinary skill in the art to translate portions of the merchant B database 35 into HyperText Markup Lanuage (HTML), which may then be accessed by other parties on port 80 with hypertext transfer protocol (http). In one embodiment, the storefront toolset provided with the Site Server Commerce Edition 3 product from Microsoft™ may be used.
The interpretation of the page listing may be performed with the help of the portal switch 39. The portal switch 39 may parse, and add supplemental information to the page listing information. For example, the portal switch 39 may add the availability and price of goods or services mentioned in the page listing. The format of the search string is specified in the query format referred to in row 825. An optional parse routine is listed in the parse format referred to in row 826, and the resulting data is described by the field data referred to in row 827. (The default field format may be as described above to provide a common language.)
After the portal switch software collects specifications of the participant's computer, the information may be verified with the interactive help of a reflector site. For each access profile, the portal switch software may ask that the reflector site send or receive a request and verify that the access path is available and correct.
In one embodiment, the application that is the portal switch 39 may have a unique port number associated with it. The aggregator 40 may invoke the portal switch 39 on the merchant B server 31, for example, by including the port number. For the portal switch access URL, the software may enter the portal switch operational process in a table such as the inet daemon's table and have calls to that TCP/IP or UCP port invoke the portal switch process. If the portal switch access URL is e-mail, then when mail is sent to that e-mail address, the portal switch 39 should be invoked to process it. In one embodiment, the participant is able to supply his own e-mail address and manually feed the portal switch e-mail message to the portal switch application.
When the portal switch access URL is declared, the initialization service may connect to that URL, and utilize a reflector to test whether a connection is present. A default reflector service may be maintained by the ISV or clearinghouse with known addresses.
Similarly, the independent software vendor 60 may have an arrangement with one or more certificate authorities (such as Verisign™) to manage certificates, or act as a certificate authority itself. A subscriber access code or “token” good for one use at such a certificate authority may be included in the package.
In one embodiment, the software may generate a public/private key pair, and create a self-signed X.509 certificate, using a package such as BSAFE produced by RSA™. This certificate is then registered with a certificate authority and the private key is secured with a password on a removable disk (or PC Card or SmartCard token) for the participant's protection (with a backup copy on a separate removable disk or token). In this manner, only the participant may have the original identity private key and the participant may be responsible for protecting it.
Referring now to
Another situation may arise where the portal switch 39 operates, but the merchant B server 31 is not turned on or connected to the network. The switch 39 will then request that information to be exchanged between the merchant and the aggregator 40 be queued, and wait to transmit the respective information until the merchant B server 31 is connected. For example, dial-up merchants may agree via the portal switch settings to perform or queue sales at the aggregator's site. However, the authoritative source for the merchant's catalogue and associated sales operations may remain at the merchant's site.
Referring now to
The merchant instals part or all of the portal switch 39 on his server 31, step 122, and may decide to activate the portal switch 39, step 124, to participate in an aggregator's Web site. It should be noted that the activation of the switch may be sufficient for the merchant's participation and that no prior arrangement, contractual or otherwise, may be required between merchant 38 and aggregator 40 to begin electronic commerce transactions. However, a contractual relationship between the merchant 38 and the aggregator 40 may, in addition, be implicit in the software license agreement between the merchant 38 and the independent software vendor 60.
By activating the switch in step 124, the merchant participates in the aggregator's Web site by, as discussed above with reference to
The merchant may deactivate the portal switch 39 at any time, thereby withdrawing from the aggregator's Web site/portal, step 118. From that time on, the aggregator 40 no longer has the permission of the merchant to collect or use data from the merchant's site, whether or not the aggregator is still able to collect and display data from the merchant's site. In addition, the aggregator 40 may still have access to any data stored on the aggregator catalog and data profile 44 and/or aggregator log and database 46 pertaining to the merchant 38. The merchant 38 may decide to reactivate the portal switch 39 at any time without prior negotiations with the aggregator 40, step 120, in which case the process returns to step 124. Otherwise, pending transactions, open invoices and the like may have to be handled manually or may have to wait until the next activation of the portal switch 39 by the merchant 38, step 130. Such details may be specified and incorporated as parameters in the switch settings (see FIGS. 5-8).
The software for the portal switch 39 may include a series of screens helping the merchant 38 and/or aggregator 40 to a) identify each other, and assert that identity publicly, either through self-assertion or with the digital signature of a certificate authority; b) identify the participant's (merchant and/or aggregator's) product or service data storage and retrieval system, its capabilities, access methods, and availability; c) create or verify descriptions of partners (merchants and/or aggregators) with whom one is willing to exchange information (as well as exclusion lists of unwanted partners); d) establish preferences and limits on data exchange with partners matching a particular description; e) and, optionally, register these preferences with a clearinghouse system.
When the initial parameters are set up, the software application for the portal switch 39 negotiates actual parameters between the participant and partners who meet the criteria set for data exchange and then enables or directs the data exchange process. In one embodiment of the invention, the “open” operation, the portal switch 39 may be used for the participant to tell other partners (other participants) how and when to access the participant's data and how to interpret the information received. The interfaces are freely available, with any access controls being applied by security mechanisms independent of the software of the portal switch 39. In “open” operation, partners access the portal switch 39 primarily for information about how to access data, but actually access the data through existing mechanisms. For easy access, the portal switch 39 may be available on a well-known TCP/IP or User Datagram Protocol (UDP) port registered with the Internet Assigned Numbers Authority (IANA). There may also be a default port associated with the portal switch 39 if none is explicitly supplied.
In a second embodiment of the invention, the “proxy” operation, software of the portal switch 39 may be used like the software of a proxy server, and to access data on behalf of the requesting participant. The proxy operation may allow finer-grained restrictions than the open operation. For example, the proxy operation may allow an external participant to access a database via Open DataBase Connectivity (ODBC), but limit the format of the SQL statements utilized by the external participant, or filter the information that is returned.
When invoked, the portal switch 39 may:
When the portal switch application is first loaded, data structures may be incomplete, or not yet initialized. To complete the data structures, the application may:
At each invocation, the user may want to change a table. Accordingly, the application may prompt the user to add, modify, or delete a table. Changes may be kept in temporary files and not moved to the permanent files until the participant key is present and the participant has confirmed the changes. When each file is moved, a digital Message Digest 5 (MD5) hash of the file may be made and digitally signed using RSA. The resulting signatures may be stored in a separate file, verify.dat. (These signatures may be used to verify that a given data file matches the configuration specified by the participant and has not been altered.)
In one embodiment, at the end of each configuration sequence, modified data in the access profile table 820 may be tested against the reflector site. This may be accomplished by replacing the partner list with the reflector site. (Optionally, a reflector or clearinghouse site might also check the matching parameters against a set of known sites to provide a return sample of what partners match the specifications.)
As another aid in testing, the participant may develop or modify an explicit set of partner tables 840 that describe partners that the participant may want a specific filter to include or exclude. The application may determine if the specified access profile is producing results that the participant finds satisfactory.
There are several methods by which a participating merchant 38 may contact an aggregator 40. The merchant 38 may determine which aggregator 40 may contact it through the profiling. To initiate contact, the portal switch application may send a copy of the preferences to a CLEARINGHOUSE. The CLEARINGHOUSE runs the templates against the certificates of known AGGREGATORS, and sends the merchant's certificate to those aggregators to inform them that the merchant is willing to exchange information with them. Alternatively, at the merchant's discretion, the merchant 38 may be notified of matching AGGREGATOR certificates. The clearinghouse may update these at a specified interval.
Another method by which a participating merchant 38 may contact an aggregator 40 is via a default port. A merchant 38 and aggregator 40 that use the default port can find each other by web-crawling, a technique which seeks out new sites and checks the default port to see if it is the contact method. In this method, one participant sends the other the originator's certificate via the default port.
Another method by which a participating merchant 38 may contact an aggregator 40 is through negotiation. Once one party, the initiator, has sent an introductory certificate to the other, negotiation may begin. The recipient first checks blacklists. If the initiator is on the recipients blacklist, the initiator's certificate is returned with a note that it should be added to the initiator's blacklistee list and that the initiator should cease soliciting the recipient. If the initiator is on the recipient's access profiles table 820 (or the DEFAULT access profile), then the recipient may return the recipient's certificate along with a copy of part or all of the access profile. The initiator site may select an access method from the list provided in the recipient's access profiles table 820. A modified access profile may be returned to the recipient indicating the method the initiator intends to use.
Access profiles may be negotiated with the help of an appropriate algorithm. To see if two parties are compatible, in an access pass, it may be confirmed that each party's certificate is explicitly listed in one of the partner profiles of the other party, or that it passes the access profile's filter criteria. The first matching profile may be used. If either party has blacklisted the other, the parties are not compatible. In a feature pass, a list of features, such as access method, and access format may be checked to see if the party's features are compatible. The highest item on the merchant's access profile that is also supported by the aggregator's profile may be chosen. If they are not compatible, another access profile may be checked, although the merchant 38 may be able to forbid this. If they are compatible, an access profile may be produced that agrees with both parties as an operational profile. The profile may be released to both parties as the agreed method of functioning. (If there are secondary agreements, they may be listed in the joint access profile as well.) The resulting access profile may be matched against known working (or non-functional) profiles. (These profiles may be generated by asking the merchant's portal switch to run them by a reflector switch, or manually maintained by the matching party.) Better matching algorithms may be used, or invented to make one clearinghouse better than another. Input to the matching algorithm are two lists of access profiles, one for the aggregator, and one for the merchant. (If the match takes place at one location or the other, the match may be between one access profile or access profile list submitted by the remote location and the local access profile list).
Data exchange between the merchant 38 and aggregator 40 may take place outside the portal switch 39, when for example, the data is publicly available. Participants or users that are informed through the portal switch 39 that their attentions are not desired may be asked to not perform data mining operations through a portal switch agreement. Data mining performed by these participants or users on public interfaces may amount to copyright infringement.
Data transfers may occur via pulling or pushing. The aggregator 40 may pull data from the merchant 38, either on a schedule or on demand. Pull actions may include queries against a structured database (e.g. ODBC), queries against a web search engine, and fetching a structured file (and parsing instructions or code). The merchant 38 may also periodically push data to the aggregator 40. Pushing actions may include the merchant transferring data to the aggregator 40 using email or ftp to transfer an Excel™ spreadsheet, or posting updates to a structured database on the aggregator 40. Although the same technologies may be used for push and pull, the distinction may refer to who initiates and controls the transfer of data.
Some interfaces may require better access control than the public interfaces provide. In such cases, the portal switch application may be extended to act as a proxy server, which may accept only connections approved by the portal switch 39. The portal switch 39 may determine who may access the proxy server. Additional proxy specific filters may be added to the appropriate access profiles table 820. For example, a database access proxy may limit access to the database, and specify the kinds of queries that may be made to that database. The database access proxy may also forbid access to specific tables, and control log ins to the database with a specific set of user privileges. This would allow ODBC to be used (a) without making a full web-accessible ODBC (the advantage being more security and reducing bugs), and (b) making a limited ODBC accessible through a firewall that is configured to forbid access to ODBC ports.
In one embodiment, Java may be used to write the software of the portal switch 39, since it may have desirable portability. Some or all of the portal switch 39 may be more easily written in “C” on an operating system platforms, such as Unix variants, to better influence the operating system's native networking code and interact with security software. The hardware and operating systems upon which the portal switch may run may include Sun™ workstations with Solaris™, Pentium™ PCs with Windows 95/98/2000™, Windows NT 4™, or Linux. On Solaris™, for example, the portal switch 39 may interact with security software such as tcp-wrapper, which controls access to specific ports by IP address, to open or close those ports to specified partners.
While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is to be limited only by the following claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5527156||Nov 4, 1994||Jun 18, 1996||Samsung Heavy Industry Co., Ltd.||Apparatus for and method of controlling engine and pumps of hydraulic construction equipment|
|US5842178||Jan 30, 1998||Nov 24, 1998||Giovannoli; Joseph||Computerized quotation system and method|
|US5862223 *||Jul 24, 1996||Jan 19, 1999||Walker Asset Management Limited Partnership||Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce|
|US5950173 *||May 12, 1997||Sep 7, 1999||Ipf, Inc.||System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents|
|US6128624||Nov 12, 1997||Oct 3, 2000||Ncr Corporation||Collection and integration of internet and electronic commerce data in a database during web browsing|
|US6233609||Nov 24, 1998||May 15, 2001||Selectica, Inc||Method and apparatus for remote interaction with and configuration of a wan-based knowledge base|
|US6405174 *||Oct 5, 1998||Jun 11, 2002||Walker Ditial, Llc||Method and apparatus for defining routing of customers between merchants|
|US6510418 *||Jan 4, 1999||Jan 21, 2003||Priceline.Com Incorporated||Method and apparatus for detecting and deterring the submission of similar offers in a commerce system|
|US6584451 *||Jun 8, 1999||Jun 24, 2003||Ariba, Inc.||Facilitator for aggregating buyer power in an on-line market system|
|US6615247 *||Jul 1, 1999||Sep 2, 2003||Micron Technology, Inc.||System and method for customizing requested web page based on information such as previous location visited by customer and search term used by customer|
|US6751669 *||Mar 24, 1997||Jun 15, 2004||Avaya Technology Corp.||Multimedia multiparty communication system and method|
|US6760758 *||Aug 31, 1999||Jul 6, 2004||Qwest Communications International, Inc.||System and method for coordinating network access|
|US6801938 *||Jun 19, 2000||Oct 5, 2004||Torrent Systems, Inc.||Segmentation and processing of continuous data streams using transactional semantics|
|US6845448 *||Jan 7, 2000||Jan 18, 2005||Pennar Software Corporation||Online repository for personal information|
|US20020007099 *||Nov 30, 1998||Jan 17, 2002||Charles-Marie Anciaux||Process for producing and purifying 1,1-difluoroethane, and product thus obtained|
|US20020016910 *||Feb 9, 2001||Feb 7, 2002||Wright Robert P.||Method for secure distribution of documents over electronic networks|
|US20020032611 *||Mar 5, 2001||Mar 14, 2002||Khan Ahmad Hasan||Methods and systems for sourcing bill of material and data handling configurations software|
|US20020128916 *||Feb 28, 2001||Sep 12, 2002||Walter Beinecke||Methods, apparatus and articles-of-manufacture for distributing/redeeming a universal incentive currency|
|US20030065591 *||Nov 7, 2002||Apr 3, 2003||Sabre Inc.||Demand aggregation and distribution system|
|WO1996021192A1 *||Jan 2, 1996||Jul 11, 1996||Citibank, N.A.||System and method for electronic sale of goods|
|1||*||Dalton, G., "XML Becomes a Standard; Vendors Ready Products-Language Likely to Boost E-Commerce, Ease Web Searches," Information Week, p. 34, Feb. 16, 1998.|
|2||*||Luh, J.C., "Group contemplates Syndication Spec," Internet World, vol. 21, No. 1, Nov. 2, 1998.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7061900 *||Jul 9, 2001||Jun 13, 2006||Sterling Commerce, Inc.||Electronic commerce distributed network and method|
|US7236947 *||Jan 25, 2002||Jun 26, 2007||Hewlett-Packard Development Company, L.P.||Providing highly automated procurement services|
|US7277924||May 7, 2002||Oct 2, 2007||Oracle International Corporation||Method and mechanism for a portal website architecture|
|US7324964 *||Dec 6, 2001||Jan 29, 2008||America Online, Inc.||Method and apparatus for commerce item information homogenization in electronic commerce system|
|US7356491 *||Dec 23, 2003||Apr 8, 2008||International Business Machines Corporation||Method for transferring large supplier catalogs through the internet network|
|US7370011 *||Jun 28, 2001||May 6, 2008||Yahoo! Inc.||Financial information portal|
|US7480795 *||Dec 16, 2004||Jan 20, 2009||Certicom Corp.||Method for the application of implicit signature schemes|
|US7548957||May 7, 2002||Jun 16, 2009||Oracle International Corporation||Method and mechanism for a portal website architecture|
|US7640210||Dec 29, 2009||Yahoo! Inc.||Financial information portal|
|US7865519||Nov 17, 2004||Jan 4, 2011||Sap Aktiengesellschaft||Using a controlled vocabulary library to generate business data component names|
|US7873765 *||Jan 18, 2011||Google, Inc.||Method and system for detection of peripheral devices and communication of related devices|
|US7958186 *||Dec 31, 2003||Jun 7, 2011||Sap Ag||Restructuring integration system|
|US7971198||Jun 8, 2005||Jun 28, 2011||Unoweb Inc.||Method for global resource sharing having logically linked means and integrated functionality for building solutions|
|US8005744||Aug 23, 2011||Alan Hamor||Methods and systems for facilitating bids on products and services|
|US8005755 *||Aug 23, 2011||Yodlee.Com, Inc.||System and method for syndicated transactions|
|US8069347||Dec 11, 2008||Nov 29, 2011||Certicom Corp.||Method for the application of implicit signature schemes|
|US8086643 *||Jun 28, 2001||Dec 27, 2011||Jda Software Group, Inc.||Translation between product classification schemas|
|US8117649||Aug 5, 2010||Feb 14, 2012||Dormarke Assets Limited Liability Company||Distributed hierarchical identity management|
|US8121907||Feb 12, 2008||Feb 21, 2012||International Business Machines Corporation||System for transferring large supplier catalogs through the internet network|
|US8260706 *||Sep 4, 2012||Yodlec.com, Inc.||System and method for syndicated transactions|
|US8260806||Sep 4, 2012||Grdn. Net Solutions, Llc||Storage, management and distribution of consumer information|
|US8266305 *||Sep 11, 2012||Akamai Technologies, Inc.||Method and system for purging content from a content delivery network|
|US8307027 *||Nov 6, 2012||Sap Ag||Creating or interpreting an electronic communication|
|US8307047||Nov 6, 2012||Unoweb, Inc.||Method of a first host of first content retrieving second content from a second host and presenting both contents to a user|
|US8316429 *||Jan 31, 2006||Nov 20, 2012||Blue Coat Systems, Inc.||Methods and systems for obtaining URL filtering information|
|US8453209||Jun 25, 2009||May 28, 2013||Alibaba Group Holding Limited||Method and system for providing internet services|
|US8457307||Jul 10, 2008||Jun 4, 2013||Certicom Corp.||Method and system for generating implicit certificates and applications to identity-based encryption (IBE)|
|US8504704||Jan 24, 2005||Aug 6, 2013||Dormarke Assets Limited Liability Company||Distributed contact information management|
|US8522012||Oct 31, 2011||Aug 27, 2013||Certicom Corp.||Method for the application of implicit signature schemes|
|US8527752||Jan 24, 2005||Sep 3, 2013||Dormarke Assets Limited Liability||Graduated authentication in an identity management system|
|US8566248||Nov 20, 2001||Oct 22, 2013||Grdn. Net Solutions, Llc||Initiation of an information transaction over a network via a wireless device|
|US8577806 *||Nov 12, 2003||Nov 5, 2013||International Business Machines Corporation||Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions|
|US8688764 *||Jan 18, 2002||Apr 1, 2014||Intellectual Ventures Fund 83 Llc||System, method and software product for ordering image products using images stored on a digital storage device from a plurality of order terminals|
|US8856187 *||Feb 7, 2008||Oct 7, 2014||International Business Machines Corporation||Data management for data aggregation|
|US8959652||Aug 30, 2013||Feb 17, 2015||Dormarke Assets Limited Liability Company||Graduated authentication in an identity management system|
|US9071445||May 3, 2013||Jun 30, 2015||Certicom Corp.||Method and system for generating implicit certificates and applications to identity-based encryption (IBE)|
|US9245266 *||Jun 16, 2004||Jan 26, 2016||Callahan Cellular L.L.C.||Auditable privacy policies in a distributed hierarchical identity management system|
|US9298893 *||Nov 1, 2013||Mar 29, 2016||Uniloc Luxembourg S.A.||Activation code system and method for preventing software piracy|
|US20010037415 *||Apr 24, 2001||Nov 1, 2001||Gregg Freishtat||System and method for syndicated transactions|
|US20020049655 *||Jun 28, 2001||Apr 25, 2002||Michael Bennett||Financial information portal|
|US20030014426 *||Jul 11, 2001||Jan 16, 2003||Gimbert Norman Wesley||System and method for communicating aircraft and aircraft engine information|
|US20030038882 *||Jan 18, 2002||Feb 27, 2003||Lou Chauvin||System, method and software product for ordering image products using images stored on a digital storage device from a plurality of order terminals|
|US20030115105 *||Dec 14, 2001||Jun 19, 2003||Ncr Corporation||Personal data mining on the web|
|US20030120560 *||Dec 20, 2001||Jun 26, 2003||John Almeida||Method for creating and maintaning worldwide e-commerce|
|US20030126026 *||Dec 6, 2001||Jul 3, 2003||Gronberg Martin L.||Method and apparatus for commerce item information homogenization in electronic commerce system|
|US20030144852 *||Jan 25, 2002||Jul 31, 2003||Frieder Eckert||Providing highly automated procurement services|
|US20040162736 *||Dec 23, 2003||Aug 19, 2004||International Business Machines Corporation||Method for transferring large supplier catalogs through the internet network|
|US20040181795 *||Dec 31, 2003||Sep 16, 2004||Nir Kol||Restructuring integration system|
|US20040225616 *||May 9, 2003||Nov 11, 2004||Arnold Gordon K.||Method, system and computer program product for third-party verification of anonymous e-marketplace transactions using digital signatures|
|US20050097151 *||Dec 31, 2003||May 5, 2005||Sayed Omar F.||System and method for creating a network directory|
|US20050102155 *||Nov 12, 2003||May 12, 2005||International Business Machines Corporation||Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions|
|US20050193219 *||Dec 16, 2004||Sep 1, 2005||Vanstone Scott A.||Method for the application of implicit signature schemes|
|US20050283443 *||Jun 16, 2004||Dec 22, 2005||Hardt Dick C||Auditable privacy policies in a distributed hierarchical identity management system|
|US20060005020 *||Jan 24, 2005||Jan 5, 2006||Sxip Networks Srl||Graduated authentication in an identity management system|
|US20060005263 *||Jan 24, 2005||Jan 5, 2006||Sxip Networks Srl||Distributed contact information management|
|US20060053120 *||Sep 7, 2004||Mar 9, 2006||Hong Kong Applied Science And Technology Research Institute Co., Ltd.||Web service registry and method of operation|
|US20060106824 *||Nov 17, 2004||May 18, 2006||Gunther Stuhec||Using a controlled vocabulary library to generate business data component names|
|US20060200425 *||Jan 6, 2006||Sep 7, 2006||Enfotrust Networks, Inc.||Single sign-on for access to a central data repository|
|US20060282837 *||Jun 8, 2005||Dec 14, 2006||John Almeida||method for global resource sharing having logically linked means and integrated functionality for building solutions|
|US20070007331 *||Apr 26, 2006||Jan 11, 2007||Verety Llc||Order processing apparatus and method|
|US20070040026 *||Sep 26, 2006||Feb 22, 2007||Verety, Llc||Order processing apparatus and method|
|US20070083437 *||Sep 23, 2005||Apr 12, 2007||Wk Networks. Inc.||Methods and systems for facilitating bids on products and services|
|US20070174442 *||Sep 18, 2006||Jul 26, 2007||Alexander Sherman||Method and system for purging content from a content delivery network|
|US20070180510 *||Jan 31, 2006||Aug 2, 2007||Darrell Long||Methods and systems for obtaining URL filtering information|
|US20070198374 *||Apr 13, 2007||Aug 23, 2007||Sony Electronics, Inc.||Method and system for distributing product information|
|US20070255611 *||Aug 30, 2006||Nov 1, 2007||Csaba Mezo||Order distributor|
|US20080010298 *||Jun 29, 2007||Jan 10, 2008||Guardian Networks, Llc||Storage, management and distribution of consumer information|
|US20080052350 *||Oct 30, 2007||Feb 28, 2008||John Almeida||A Virtual Network Resource Infrastructure (VNRI) arrangement|
|US20080133413 *||Feb 12, 2008||Jun 5, 2008||Yahoo! Inc.||Financial information portal|
|US20080294533 *||Feb 12, 2008||Nov 27, 2008||International Business Machines Corporation||System for transferring large supplier catalogs through the internet network|
|US20090037535 *||Aug 3, 2007||Feb 5, 2009||Sap Ag||Creating or Interpreting an Electronic Communication|
|US20090046852 *||Jul 10, 2008||Feb 19, 2009||Vanstone Scott A||Method and system for generating implicit certificates and applications to identity-based encryption (ibe)|
|US20090086968 *||Dec 11, 2008||Apr 2, 2009||Vanstone Scott A||A method for the application of implicit signature schemes|
|US20090204565 *||Feb 7, 2008||Aug 13, 2009||Kanamatareddy Ravi K R||Data management for data aggregation|
|US20090328174 *||Dec 31, 2009||Alibaba Group Holding Limited||Method and system for providing internet services|
|US20100306830 *||Aug 5, 2010||Dec 2, 2010||Hardt Dick C||Distributed Hierarchical Identity Management|
|US20110282711 *||Nov 17, 2011||Yodlee.Com, Inc.||System and Method for Syndicated Transactions|
|US20120023012 *||Jan 26, 2012||Alain Brousseau||System and Method for Registering an EDI Participant Identifier and Managing EDI Trading Partners|
|U.S. Classification||705/26.2, 705/26.35, 705/27.1|
|Cooperative Classification||G06Q30/0641, G06Q30/0609, G06Q30/06, G06Q30/0605|
|European Classification||G06Q30/06, G06Q30/0605, G06Q30/0609, G06Q30/0641|
|Mar 13, 2000||AS||Assignment|
Owner name: GTE LABORATORIES INCORPORATED, MASSACHUSETTS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VITTAL, JOHN JACQUES;MILLS, CYNTHIA GRACE;BROTHERS, LAURENCE RAPHAEL;REEL/FRAME:010679/0334
Effective date: 20000310
|Nov 9, 2000||AS||Assignment|
Owner name: VERIZON LABOARTORIES INC. (A DELAWARE CORPORATION)
Free format text: CHANGE OF NAME;ASSIGNOR:GTE LABORATORIES INCORPORATED;REEL/FRAME:011099/0045
Effective date: 20000630
Owner name: VERIZON LABORATORIES INC., MASSACHUSETTS
Free format text: CHANGE OF NAME;ASSIGNOR:GTE LABORATORIES INCORPORATED;REEL/FRAME:011939/0832
Effective date: 20000630
|Sep 26, 2003||AS||Assignment|
Owner name: GENUITY INC., MASSACHUSETTS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON LABORATORIES INC.;REEL/FRAME:014007/0470
Effective date: 20000628
Owner name: VERIZON CORPORATE GROUP SERVICES INC., NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON LABORATORIES INC.;REEL/FRAME:014007/0470
Effective date: 20000628
|Mar 23, 2005||AS||Assignment|
Owner name: LEVEL 3 COMMUNICATIONS, INC., COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENUITY, INC.;REEL/FRAME:016468/0239
Effective date: 20030204
|Sep 6, 2006||AS||Assignment|
Owner name: MERRILL LYNCH CAPITAL CORPORATION, AS COLLATERAL A
Free format text: SECURITY AGREEMENT;ASSIGNORS:LEVEL 3 COMMUNICATIONS, INC.;ICG COMMUNICATIONS, INC.;REEL/FRAME:018207/0120
Effective date: 20060627
|Mar 12, 2007||AS||Assignment|
Owner name: LEVEL 3 COMMUNICATIONS, LLC, COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEVEL 3 COMMUNICATIONS, INC.;REEL/FRAME:018989/0678
Effective date: 20070312
Owner name: LEVEL 3 COMMUNICATIONS, LLC,COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEVEL 3 COMMUNICATIONS, INC.;REEL/FRAME:018989/0678
Effective date: 20070312
|Dec 15, 2008||FPAY||Fee payment|
Year of fee payment: 4
|Aug 6, 2010||AS||Assignment|
Owner name: LEVEL 3 COMMUNICATIONS, LLC, COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON CORPORATE SERVICES GROUP INC.;REEL/FRAME:024804/0080
Effective date: 20100712
|Aug 11, 2010||AS||Assignment|
Owner name: VERIZON CORPORATE SERVICES GROUP INC., NEW JERSEY
Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME TO BE LISTED AS: VERIZON CORPORATE SERVICES GROUP INC. PREVIOUSLY RECORDED ON REEL 014007 FRAME 0472. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:VERIZON LABORATORIES INC.;GENUITY INC.;REEL/FRAME:024823/0317
Effective date: 20000628
|Oct 1, 2012||FPAY||Fee payment|
Year of fee payment: 8